Hi,
On Tue, Nov 25, 2014 at 08:58:04PM +0100, tor-ad...@torland.me wrote:
> Don't store identity keys on the hard disk. Keep them offliner. Use a ramdisk
> for /var/lib/tor/keys/ and copy keys to it via scp before starting your tor
> instance. Remove it from the ramdisk after s
tcp from any to port = flush global)
label "ssh: in "
You can adjust the parameters to control when a host is blacklisted and for how
long.
--
regards
alex
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
ying if you have trouble or want a solution without any extra
software, the firewalls can do this.
> You also reminded me of a big factor I forgot to mention in the doc:
> firewalls.
>
Hehe no problem.
Thx for putting up with the effort to create such a doc.
--
regards
alex
__
hi,
just want to note, i am proud to have an german exit node with 11Mbs ..
but also concerned about this raising exit node probability, actually it
reads for me like 1 of 400 tor-users is going through this exit (by
recalculating a exit probability of 0.25 %) - this concerns me because
it
Thx for your Answer,
i think ive managed to configure the tor service properly,
my concerncs were about how easy it is to get one out of 3-400 Tor users
through your specific exit, and somehow i think this should not be
possible so easy.
so here the Atlas link, where you can see with 10Mbit/s
43, and 6667 and allows exits to at
>least one /8 address space.
I'd love to see 6697 in this set as an alternative to 6667. Irrespective
of the fact that you can - and many people do - speak irc over lots of
different ports, this is the one most often used for IRC via TLS.
____
here was interest from enough people.
Gief.
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
m OVH because DanTor recorded my
relays,
> then CBL recorded DanTor, then SpamHaus Zen recorded CBL, which
allowed
> OVH to claim "100% of your IPs are blacklisted on multiple lists"
when
> in reality it was from a guy in the UK who publishes all Tor relays
-
> guard, middle, ex
to some
(or
> most or even all) of the nodes that are discussed in this thread.
>
I'd be curious to know what this checker says about the IP address
that ultimately got this ISPs attention:
http://mxtoolbox.com/blacklists.aspx
I run 2 fast exits with only ports 25 and 465 rejected.
# Cryptolocker
ExitPolicy reject 173.193.197.194 # Cryptolocker
In general, I see complaints about abuse from the exit relays we run
due to someone using Tor to try to exploit remote web server scripts
and databases and the like. I don't think there's anything that can be
done about
Dear yl,
just a few words from the abuse helpdesk of a larger tor-exit-node...
TL;DR: we ignore those requests. they don't even reach a human.
While we do handle most genuine/honest/helpful and especially all
non-automated abuse reports very diligently. Pointless nagging
services like we
Mathewson
:
TL;DR: Stable non-exit relays can help tor clients use the Tor
network. Please opt-in!
We want to run a trial of fallback directory mirrors (fallbacks) in
Tor. Tor clients contact fallbacks to download the consensus during
initial bootstrap, before they contact the directory authorities
00mbit/s over two years now and we'll
do what we do even without your funding however BTC donations are much
appreciated and will be used for hardware upgrades.
Cheers.
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproj
(as september last year)
Other factors probably also play a role. If anyone can contribute their
opinion based on their experience and the publicly available data,
feel free!
Cheers.
_______
tor-relays mailing list
tor-relays@lists.torproj
Hello,
Is it possible to configure a TOR node to have different bandwidth
limits at different times of day and on different days of the week?
Thank you.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi
both. It is assumed that passing the traffic
through the private switch isn't a meaningful security concern.
What that means to tor server operators is that if you're using a
vserver where the internals are set up this way, the unencrypted
contents of your disk are likely being expos
Likely someone was doing credit card fraud/hacking type stuff and
choosing Tor as the way to connect for it. That stuff is a pain in the
ass for online stores when it happens. Not surprised that outfits
handling online payments don't want Tor connections, and I can't blame
them
hosting is set up.
On Monday 26/08/2013 at 10:53 pm, Tony Xue wrote:
Hi,
I have been discovering simple and secure way of protecting the Tor
key files recently, in order to achieve the safety of the keys on VPS.
So I created a folder on Linux called /tor and it is stored in the
ge system of the
vserver?
Date: Tue, 27 Aug 2013 00:14:36 -0400
From: t...@t-3.net
To:
Subject: Re: [tor-relays] Store key files in RAM
Message-ID: <521c27ac.570.f998d700.4984...@t-3.net>
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
IMO cut and paste in the
A mechanism which empowers detecting and
stopping what you and I consider to be
'evil' could be harnessed and used to
target non-evil things, and that's
where the problem is.
Let's pretend that tomorrow, Tor gained
the ability to filter out evil images.
Shortly thereafte
my exit's
too. (as well as nearly double the amount of connections).
-Stracci
- Original Message -
From: "mick"
To: tor-relays@lists.torproject.org
Sent: Friday, August 30, 2013 9:27:12 AM
Subject: [tor-relays] huge increase in relay traffic
I'm currently
0' while fetching "
And then there is a very long string designating a path
which starts with "/tor/server" and then has a whole bunch of 40-digit
hexadecimal numbers separated with + signs, and then the whole thing
ends with a single ".z". Then the line says "I&
I added a second core to my server and it's still getting "Your
computer is too slow..." error messages. Top shows cpu for the Tor
process hanging around 60-75%, which is where it was before. Top's
system total is hanging around "Cpu(s) 25.9%". That plus the VM
This thread did go goofy and bad (and off-topic, given the subject in
the emails). It seems clear that there are important reasons Tor could
never begin examining/taking direct responsibility for/filtering the
content that flows through it (as opposed with disallowing specific
ports, which is
ddos_dirtjumper". Behavior last seen 14 hours ago.
Read a little about it - wondering if it requires a malicious Tor user
to cause a machine to make this kind of traffic flow through Tor, or
if an infected victim using Tor would be enough.
Seems exit node operators may be able to stop this
I feel like you are SO missing the point.
Making Tor block morally horrible things does not involve telling exit
notes to block traffic to known porn sites.
The porn sites with the boobies that someone might hit on port 80 on
the public internet represent the Catholic Church of porn
Here is what Top on our Tor relay is doing today:
PID USER PR NI VIRT RES SHR S %CPU %MEMTIMECOMMAND
1163 _tor 20 0 628m 286m 34m R 106.3 15.3 4693:47 tor
Logs filled with:
Sep 03 04:12:20.000 [warn] Your computer is too slow to handle this
many circuit creation
lp. I did a service restart on it to bring it back
down.
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Are you sure you didn't confuse bits and bytes? Tor counts in bytes.
(The arm monitor, if that's what you're using, counts in bits by
default.)
As with real networks and operators, if this is so, then big thank
you to arm people for correctly counting network bandwidth in bps
subnet, and another couple IPs, maybe?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
n involved, and nothing personal
intended. It may be worth noting that certain presumably-Tor-hostile
and well-funded agencies are known to infiltrate the tech
organizations/efforts which they wish to weaken, and influence them
from the inside. In this context, seeing Tor's exit node oper
ntact
pgp 0x6B4D6475
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://list
r work, making their crypto be
weaker/breakable and their systems easier to hack into. They use the
vulnerabilities they created to their own ends.
As of today, Tor appears to provide privacy, at least as far as the
.onion sites goes. Maybe it even works for it's entire function of
pro
transfer would change anything about
that?
It's not all about the method. Thoughts are:
- One way to damage Tor would be to mess things up for exit node
operators either personally or professionally. IMO the less 'they'
know about exit operators, the less damage they can
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Reply to the email, say that you found a misconfiguration in your Tor
daemon which could have accounted for this problem and you've repaired
it, and hopefully this problem is resolved for the future.
Put the below as your exit policy in torrc, and I'd stop/start the
service to
itPolicy accept *:1723 # PPTP
How are you getting PPTP to work over Tor? The ISP-supplied modems
i've
seen won't pass IP protocol 47 (GRE) packets without putting the
target
machine in a DMZ.
https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy
contains it.
It
see zero abuse complaints, if there were a
| good way to do that.
|
|
|
|
| On Wednesday 30/10/2013 at 6:41 am, Moritz Bartl wrote:
| > On 25.10.2013 19:13, krishna e bera wrote:
| >>
| >>>
| >>> ExitPolicy accept *:1723 # PPTP
| >> How are you getting PPTP t
ive exit restriction policy in the responses to take-down
> demands seems like a good idea.
>
> Robert
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
nection :) Pretty decent speeds,
unlimited bandwidth:
http://www.speedtest.net/result/3001260636.png
> Thank you for running an exit relay!
I wasn't using my connection for much of anything else and after reading
about Tor in the Snowden files I f
Hi list,
I have set up a tor relay with no exit functionality yet. Having read
through the documentation and general legal hints, I am still unsure
of the legal situation in Germany. Are there some of you guys who
had contact with hosting providers because of abuse claims?
Is there
Here's where top hangs out on Libero. Seems it would be a better
situation if Tor would actually use the second core.
top - 12:05:07 up 5 days, 21:35, 1 user, load average: 0.33, 0.43,
0.34
Tasks: 130 total, 2 running, 128 sleeping, 0 stopped, 0 zombie
Cpu0 : 47.2%us, 21.0%sy,
chase a little temporary Safety, deserve
> neither Liberty nor Safety.
> --
> Benjamin Franklin (1706 - 1790), Inventor,
> journalist, printer, diplomat, and statesman
>
>
>
> Here's where top hangs out on Libero. Seems it wou
Hi list,
as I am in the progress of looking for a dedicated box to host a high volume relay on,
as one of my current Tor-VPSs has some TCP limitations so I took it down. After doing
some reasearch, my shortlist came up with OVH. After reading their (awfully translated:
Babelfish French to
Grah,
please don't mind the confusing opening. I was kind of distracted ;)
Cheers.
Gesendet: Samstag, 25. Januar 2014 um 16:15 Uhr
Von: t...@gmx.info
An: tor-relays@lists.torproject.org
Betreff: [tor-relays] A little bedtime story about relays and OVH
Hi list,
as I am i
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hello,
i search a working init script for multiple tor instances. I tried it
from https://www.torservers.net/misc/config/initd-tor but that is
broken. Does somebody have a working one?
Thanks for help
-BEGIN PGP SIGNATURE
Johannes Fürmann:
> On 02/16/2014 09:55 PM, t...@afo-tm.org wrote:
>> i search a working init script for multiple tor instances. I tried it
>> from https://www.torservers.net/misc/config/initd-tor but that is
>> broken. Does somebody have a working one?
> Hi!
>
> I
e
to do to be able to connect via tor to ipv6?
Thanks for help
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
ipV6 destination. Did i miss something? what else
> to do to be able to connect via tor to ipv6?
>
> Thanks for help
>
For people that are interestet in that to here the solution.
You have to set on Clients
"SocksPort 0.0.0.0:9150 IPv6Traffic PreferIPv6" to make IPV6 work
_
der how long it will take our relays to recover?
I wonder if it is a good idea, or technically feasible, to do a one
time kick-over of something in the Tor network so that the system sees
what the relay flags etc. should be on these emergency-redefined
relays. Certainly if everyone updated
le, were never vulnerable to this bug. I imagine there are
some
> FreeBSD or the like people out there in a similar boat. And Centos
> people, etc.
>
> --Roger
>
> ___________
> tor-relays mailing list
> tor-relays@lists.torproject.org
>
Perl script attached which I made to take this !reject formatted list
of bleeding tor nodes and reformat it into a mega-long ExcludeNodes
line and put it at the end of my exit node's torrc. My tor daemon did
not bomb or complain upon seeing the line.
Hopefully that is the right way t
Hi
Where do I find the updated version of obfs4proxy for arm64?
-m
On Wed, Jan 11, 2023 at 7:00 AM
wrote:
> Send tor-relays mailing list submissions to
> tor-relays@lists.torproject.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
> https://lists
emove and 0 not upgraded.
Where do I get version 14?
-m
On Fri, Jan 13, 2023 at 7:00 AM
wrote:
> Send tor-relays mailing list submissions to
> tor-relays@lists.torproject.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
> https://lists.torproject
the backport of obfs4proxy seems to be unsigned
I needed to use:
deb [trusted=yes] http://deb.debian.org/debian bullseye-backports main
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor
Be aware that attacks against you will be possible, since any traffic coming
from that IP is only used by you. Unlike normal Tor users where they blend and
hide amongst each other. You will be the only exit user.
A personal VPN might provide similar anonymity and be easier to manage and run
Hi,
I'm attempting to follow the instructions for setting up a obfs4 bridge on
Windows. In my instance, it is Windows 10.
The instructions say to copy out the obfs4proxy.exe from:
C:\Users\\Desktop\Tor
Browser\Browser\TorBrowser\Tor\PluggableTransports
However, there is no obfs4 file in
Hi,
<https://reiya.io/> exists. Something like this?
There is a legal reason the Tor project doesn't fund nodes.
Regards,
On October 12, 2023 11:41:58 AM UTC, torrrel...@riseup.net wrote:
>I provided some high speed Tor nodes (non-exits and guards) but I quit
>in this year t
?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
that asking to remove the complete non-exit list to be
valuable to the security of the global internet.
While it is correct that sysadmins should maybe not block traffic just
because it's a relay. There is many use cases where they should, most
corporation end users do not need access to th
DAN's (non-exit) Tor relays list on a blocklist by default,
or without warning about potential impact to other legitimate services
(universities, libraries, shared hosting providers, hobbyist email, etc)
Ransomware links are usually opened from emails and Tor is not running on
co
;
> Am Donnerstag, 2. Mai 2019 12:10 schrieb René Ladan :
>
>
>
> >
> >
> >
> >
> > Op do 2 mei 2019 09:43 schreef Tor Revolution
> > :
> >
> > > You are probably trying to push hacked FreeBSD or that hacked
renced lists?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 21/05/19, gus wrote:
> Dear Relay Operators,
>
> Do you want your relay to be a Tor fallback directory mirror?
> Will it have the same address and port for the next 2 years?
> Just reply to this email with your relay's fingerprint.
C6B656BA6BC16E31115A
d, but yeah. Things
that make you go hmm.
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi
I've been running an obfs4 bridge for about a month.
My hashed fingerprint is:
E120A0492F789F5367EAD84C64F92EE279018F98
I recently lost the stable flag. Not sure why.
Any thoughts?
thanks
matt
_______
tor-relays mailing list
tor-r
also saw this on my Tor exit dannydevito, but these messages only
appeared once in logs (UTC time)
Nov 2 04:21:44 dannydevito Tor: Possible zlib bomb;
abandoning stream.
Nov 2 04:22:42 dannydevito Tor: Possible compression
bomb; abandoning stream.
Nov 2 04:22:42 dannydevito syslogd: last
Hello,
I have a hard time trying to correctly update my configuration following
this change, with Tor 0.4.5.2 on Ubuntu focal.
The machine has both an IPv4 and IPv6 connectivity, but my relay must
only use IPv4 to listen for connections.
The relevant parts of my configuration before moving
matt
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi All,
So everything had been working for over a year. Am currently on tor 4.2.7,
stretch. When I went to update, I got:
The following signatures were invalid: EXPKEYSIG 74A941BA219EC810 <
http://deb.torproject.org/> deb.torproject.org archive signing key
My deb.torproject.org--keyr
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi All,
Which version of tor runs on Ubuntu Server 20.04.2 LTS 64bit, if any?
Thanks
matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tor
circuit
x 09:30:52 [NOTICE] Bootstrapped 90% (ap_handshake_done): Handshake
finished with a relay to build circuits
x 09:30:52 [NOTICE] Bootstrapped 89% (ap_handshake): Finishing handshake
with a relay to build circuits
x 09:30:52 [NOTICE] Bootstrapped 85% (ap_conn_done): Connected to a relay
achablilty test everything is reachable.
However, the status page keeps saying I'm dysfunctional with a ECONNREFUSED:
https://bridges.torproject.org/status?id=E120A0492F789F5367EAD84C64F92EE279018F98
So everything seems to be working on my end.
-matt
_______
gt;
> Thank you! :-)
>
>_______
>tor-relays mailing list
>tor-relays@lists.torproject.org
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
wrote:
>
>Finally, anyone running relays: try to get connected to the community so we
>can build some trust among each other. That seems to be an essential part in
>our long-term strategy to fight bad relays trying to enter our network.
>
_______
Can you provide the Tor node fingerprints?
Any logs that show they are configured correctly, but the error is on the
DirAuths?
What steps did you take during deployment?
On February 1, 2022 3:19:20 PM UTC, Miryam Webb via tor-relays
wrote:
>Hello all,
>
>I am a new relay operator
they "glow in the dark."
I think the individual is calling the tor-node.org site a CIA style operation.
Or at least that something feels fishy about it.
On March 3, 2022 3:40:42 PM UTC, Martin Gebhardt wrote:
>Hi Marco,
>
>On 3/2/22 22:21, li...@for-privacy.net wrote:
>&g
I installed standalone Snowflake on Ubuntu per these instructions:
https://community.torproject.org/relay/setup/snowflake/standalone/. Now how can
I tell if it's running? Can I see the number of connections it's serviced? Will
it continue after a reboot?
Thanks,
Chuck Bevitt
T
've
>receiv
>ed 5253283 connections on IPv4 and 270537 on IPv6. I've made 2024515
>connections
> with IPv4 and 582464 with IPv6.
>Apr 21 15:45:08.000 [notice] Circuit handshake stats since last time: 467/467
>TA
>P, 9937327/9984534 NTor.
>
>Is this anyth
the past.
Is there any other things I can do to disrupt the damage done to the tor
network during this downtime? Especially to any clients using it as a
bridge.
Thanks,
OpenPGP_0x45E5F8C1504CDA42.asc
Description: OpenPGP public key
OpenPGP_signature
Description:
t; abuse emails get a flood of responses and update
their detection scripts. Ideally no one loses any nodes, but it seems to
have already happened.
Good luck everyone,
Dimitris T. via tor-relays:
another abuse report from hetzner (by the same watchdogcyberdefence) a
few hours ago. no reply from
Dimitris T. via tor-relays"
allegedly wrote:
similar situation here with hetzner.. got a first report 2 days ago,
and just a while ago got another abuse report, by the same
watchdogcyberdefence with more alleged activity from our ip...
like everybody else, there's nothing coming out f
You likely discovered a way, how criminals (or Intel agencies, since
there is no difference) are being allowed access to middle relays.
--x9p
On 10/29/24 04:47, mick wrote:
On Tue, 29 Oct 2024 06:52:13 +0100
Ralph Seichter via tor-relays
allegedly wrote:
* Pierre Bourdon:
A few hours ago
eys
signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi Gus!
Saturday, August 19th at 7pm
Isn't that a bit late?
Last day at 7PM some will have left already, no?
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Yeah, some operators said the same thing to me.
Friday at 4pm local time (16 - 17:30) would be better for you?
yes, anything before Saturday is better, thanks!
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org
thanks a lot!
best regards,
t...@appliedprivacy.net
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hello,
the new metricsport counter shows
that some specific tor relays (2 out of 50) have a significant
tor_bug_reached_count rate (around 8 per second).
Do you see similar?
You have to run on git main or nightly builds to see that metric.
best regards,
t...@appliedprivacy.net
On 22/10/24 12:08, denny.obre...@a-n-o-n-y-m-e.net wrote:
I still haven't found a solution to my problem I stated earlier in my
email with the subject "Exit relay not in consensus" https://
lists.torproject.org/pipermail/tor-relays/2024-October/021899.html
<https://li
On 22/10/24 14:24, Top wrote:
Hi all,
My tor relays[1] traffic decreased a lot and I think this *might* be
connected to some kind of DDOS attack.
So I wanted to use this situation to set up some DDOS protection.
For that I stumbled upon Enkidus tor DDOS mitigation script. [2]
I believe
of time.
On 29/10/24 00:33, Pierre Bourdon wrote:
Hi relay ops,
A few hours ago I received a forwarded abuse report from Hetzner for
one of my machines running a Tor relay (not exit). Some random ISP was
claiming I was sending SSH connections to them, and at first I
couldn't fin
On 28/10/24 20:30, denny.obre...@a-n-o-n-y-m-e.net wrote:
As an update, once I showed the link from OONI to my ISP, they offered
to move my server to another location at no charge. So the Tor server
was moved from India to the UK. (Actually, I built a new one from
scratch
On 1/11/24 22:42, Red Oaive via tor-relays wrote:
On 2024-10-31 23:15, Neel Chauhan wrote:
It would be hard to explain to Verizon I run Tor relays since they
technically don't allow servers. I hope I'm not forced onto AT&T
Internet Air as my particular co-op rental unit won
On 8/11/24 08:47, tor-relays+tor-rel...@queer.cat wrote:
On 8/11/24 03:14, Red Oaive via tor-relays wrote:
I just reset my SYN-ACK detection nft counter and it's still showing
activity:
tcp sport 22 tcp flags == 0x12 counter packets 9 bytes 504
This rule will also count SYN-ACKs
email, hoping it is helpful,
and will report back in a week.
Can you check to see if your relay is in a similar situation?
In particular, the situation to look for is "Tor process is
still running fine from your perspective, but, relay-search
(https://atlas.torproject.org/) says you are no l
enabled?
On 9/11/24 23:15, tor-opera...@urdn.com.ua wrote:
I can confirm that the attack has not stopped and that we continue to
monitor spoofed packets with Tor relay's IP addresses including the
addresses of relays that are at our network.
This continues to trigger the sending of reports
Is your server running a DNS server that's open to the internet on port 53?
On 6/11/24 09:25, Jose A via tor-relays wrote:
Hello everyone.
I have received a communication from my ISP regarding the IP where I
have a Middle Relay and a Bridge, informing me that this IP is being
used
On 8/11/24 03:14, Red Oaive via tor-relays wrote:
I just reset my SYN-ACK detection nft counter and it's still showing
activity:
tcp sport 22 tcp flags == 0x12 counter packets 9 bytes 504
This rule will also count SYN-ACKs sent from your own server to bots
trying to connect to you
101 - 200 of 1440 matches
Mail list logo